Join Operation Lady Justice and the National Indian Country Training Initiative for their webinar “Missing Persons, Ambiguous Loss, Reintegration: How it All Fits Together” on June 10, 2021 at 2:00–4:00 p.m. ET. The registration deadline is 5:00 p.m., ET, Friday, June 4, 2021 and the deadline for the OLE notification email is Tuesday, June 8, 2021.
Join the Bureau of Justice Assistance’s Comprehensive Opioid, Stimulant, and Substance Abuse Program for their webinar “Peer Integration into Medication-Assisted Treatment (MAT) and Other Jail-based Treatment Programs” on Wednesday, June 23, 2021 at 1:00–2:30 p.m. ET. Presenters will discuss how to successfully implement peer-based treatment programs to address opioid and other substance misuse.
Join Justice Clearinghouse, the American Society of Evidence-Based Policing, and the National Sheriffs’ Association for their webinar “Getting Curious in the Face of Conflict: How to Use Targeted Questions to Control Escalation” on Tuesday, June 8 at 1:00–2:15 p.m. ET. This webinar will discuss “a framework for understanding conflict decisionmaking; how curiosity can de-escalate tense encounters; and essential questions for handling conflict effectively.”
Join the International Association of Chiefs of Police (IACP) for their webinar “Grief & Loss in Law Enforcement: Helping Officers and Agencies Recover and Heal” on Tuesday, June 1 at 3:00 p.m. ET. This webinar will address how to help officers access appropriate resources to process the pain from grief and loss and to help them heal. Presenters will focus on both agency and individual best practices. This webinar is intended for officers, command staff, law enforcement employee assistance program personnel, officer safety and wellness staff, and mental health professionals.
This course introduces the information and techniques law enforcement personnel need to safely and methodically collect and preserve digital evidence at a crime scene. Topics include recognizing potential sources of digital evidence; planning and executing a digital evidence-based seizure; and the preservation, packaging, documentation, and transfer of digital evidence.
This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.
This course provides expert guidance in the skills law enforcement officers need to conduct successful online investigations. Topics include IP addresses and domains, an overview of currently popular social media platforms, best practices for building an undercover profile, foundational knowledge related to the dark web, and the use of the dark web as an investigative tool. Instructors demonstrate both open source and commercially available investigative tools for social engineering, information gathering, and artifacts related to social media, as well as automated utilities to capture information and crawl websites.
This course provides students with the fundamental knowledge and skills necessary to perform a limited digital forensic examination, validate hardware and software tools, and effectively use digital forensic suites and specialized tools. The course begins with a detailed review of the digital forensic examination process, including documentation, case management, evidence handling, validation, and virtualization. Students learn to use today's leading commercial and open source digital forensic suites: Magnet Axiom, X-ways Forensic, and Autopsy. Instruction on each suite will include an interface overview, configuration, hashing, file signature analysis, keyword searching, data carving, bookmarking, and report creation.
This course covers the acquisition, examination, and analysis of many types of financial records, including bank statements and checks, wire transfer records, and business records. Topics include recognizing and investigating common indicators of fraud, using spreadsheets to facilitate analysis and pattern recognition, and financial profiling. There is a strong focus on presenting financial evidence in multiple modalities: spreadsheet data outputs, graphic representations, and written/oral presentations.
This course introduces analysts to the broader concepts of connecting the dots through link analysis. A critical portion of conducting a successful analytical investigation is the ability to link together and understand the complexities of the connectedness between people and organizations. Introduction to Link Analysis expands on the basic principles of link and association analyses explored in the Foundations of Intelligence Analysis Training while building a framework for more advanced methods such as social network analysis.